
Summary
This detection rule is designed to identify potentially malicious instances of HxTsr.exe, a legitimate Microsoft executable associated with Outlook communications. The rule specifies that HxTsr.exe must originate from the 'WindowsApps' directory within 'C:\Program Files' to be deemed legitimate. Any execution of HxTsr.exe from a different directory could indicate an evasion technique employed by malware masquerading its presence as the genuine HxTsr.exe. The detection utilizes process creation events to check for instances of HxTsr.exe that do not meet the specified path criteria, raising a concern for potential threats that could impersonate this critical application.
Categories
- Windows
Data Sources
- Process
Created: 2020-04-17